Chapter 3 - Security Management Concepts & Principles.pdf
aishahmrawy
18 views
20 slides
Mar 08, 2025
Slide 1 of 20
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
About This Presentation
Security Management Concepts & Principles
Size: 565.66 KB
Language: en
Added: Mar 08, 2025
Slides: 20 pages
Slide Content
Information Systems Security
Presented By
Dr. Mohamed Marie
Chapter 3
Security ManagementConcepts
and Principles
This chapter presents the following:
Security Management Concepts and Principles
Protection Mechanisms
Change Control/Management
Data Classification
Change Control/Management
The change control process of configuration or change management has several
goals or requirements:
•Implement changes in a monitored and orderly manner. Changes are
always controlled.
•A formalized testing process is includedto verify that a change produces
expected results.
•All changes can be reversed.
•Users are informed of changes before they occurto prevent loss of
productivity.
•The effects of changes are systematically analyzed.
•The negative impact of changes on capabilities, functionality, and
performance is minimized.
Data Classification
The following are benefits of using a data classification scheme:
•Itdemonstratesanorganization’scommitmenttoprotectingvaluable
resourcesandassets.
•Itassistsinidentifyingthoseassetsthataremostcriticalorvaluabletothe
organization.
•Itlendscredencetotheselectionofprotectionmechanisms.
•Itisoftenrequiredforregulatorycomplianceorlegalrestrictions.
•Ithelpstodefineaccesslevels,typesofauthorizeduses,andparametersfor
declassification,and/ordestructionofnolongervaluableresources.
Data Classification
Thecriteriabywhichdataisclassifiedvarybasedontheorganization
performingtheclassification.However,youcangleannumerousgeneralities
fromcommonorstandardizedclassificationsystems:
•Usefulnessof the data
•Timelinessof the data
•Valueor costof the data
•Maturityor ageof the data
•Lifetimeof the data (or when it expires)
•Associationwith personnel
•Data disclosure damage assessment(that is, how the disclosure of the data
would affect the organization)
•Data modification damage assessment(that is, how the modification of the
data would affect the organization)
•National security implicationsof the data
•Authorized access to the data(that is, who has access to the data)
•Restriction from the data(that is, who is restricted from the data)
•Maintenance and monitoringof the data (that is, who should maintain and
monitor the data)
•Storageof the data